CVE-2024-14002

5.5 MEDIUM

📋 TL;DR

Nagios XI versions before 2024R1.1.4 contain an authenticated local file inclusion vulnerability in the NagVis integration. Authenticated users can manipulate path parameters to read arbitrary files from the server, potentially exposing sensitive system information. This affects all Nagios XI deployments using vulnerable versions.

💻 Affected Systems

Products:
  • Nagios XI
Versions: All versions prior to 2024R1.1.4
Operating Systems: All supported Nagios XI platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires NagVis integration enabled and authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker reads sensitive files like /etc/passwd, /etc/shadow, configuration files, or database credentials, leading to privilege escalation or complete system compromise.

🟠

Likely Case

Authenticated user with malicious intent reads configuration files containing credentials or sensitive system information, enabling lateral movement or data exfiltration.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to information disclosure from files accessible to the web server user.

🌐 Internet-Facing: MEDIUM - Requires authentication but internet-facing instances are more exposed to credential attacks.
🏢 Internal Only: MEDIUM - Internal authenticated users could exploit this for privilege escalation or data theft.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of NagVis parameter manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024R1.1.4 or later

Vendor Advisory: https://www.nagios.com/changelog/nagios-xi/

Restart Required: No

Instructions:

1. Backup current Nagios XI configuration. 2. Download latest version from Nagios customer portal. 3. Run upgrade script: ./upgrade -n. 4. Verify upgrade completion.

🔧 Temporary Workarounds

Disable NagVis Integration

all

Temporarily disable NagVis integration if not required for operations.

Navigate to Admin > System Extensions > Manage Components, disable NagVis

Restrict User Access

all

Limit authenticated user access to only necessary personnel and implement least privilege.

Review and tighten user permissions in Nagios XI admin interface

🧯 If You Can't Patch

  • Implement strict access controls and monitor authenticated user activity
  • Deploy web application firewall rules to block LFI patterns in NagVis requests

🔍 How to Verify

Check if Vulnerable:

Check Nagios XI version in Admin > About. If version is earlier than 2024R1.1.4, system is vulnerable.

Check Version:

cat /usr/local/nagiosxi/var/xiversion

Verify Fix Applied:

After upgrade, verify version shows 2024R1.1.4 or later in Admin > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file path patterns in NagVis component logs
  • Multiple failed file inclusion attempts

Network Indicators:

  • HTTP requests to NagVis endpoints with suspicious path parameters

SIEM Query:

source="nagios_logs" AND (uri="*nagvis*" AND (path="*../*" OR path="*/etc/*"))

🔗 References

📤 Share & Export